Sciweavers

1120 search results - page 86 / 224
» Securely sharing neuroimagery
Sort
View
CHI
2007
ACM
14 years 10 months ago
Over-exposed?: privacy patterns and considerations in online and mobile photo sharing
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge ? especially when the persistent nature of the media and associated context reveals ...
Shane Ahern, Dean Eckles, Nathaniel Good, Simon Ki...
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 4 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
GI
2007
Springer
14 years 1 months ago
A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme
: A multi-coupon (MC) represents a collection of k coupons that a user can redeem to a vendor in exchange for a benefit (some good or service). Recently, Chen et al. [CEL+ 07] prop...
Alberto N. Escalante, Hans Löhr, Ahmad-Reza S...
SERVICES
2010
119views more  SERVICES 2010»
13 years 11 months ago
The Networked Environment for Music Analysis (NEMA)
Abstract--Conducting valid comparative evaluations of techniques in the field of Music Information Retrieval (MIR) presents particular challenges to MIR researchers due to issues o...
Kris West, Amit Kumar, Andrew Shirk, Guojun Zhu, J...
JSW
2007
124views more  JSW 2007»
13 years 10 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon